Skip to main content

OTEL-031: TLS min_version below 1.2

Severity: deny (blocking)

Rule Details

TLS 1.0 and 1.1 have been deprecated by every major browser, by the IETF (RFC 8996), and by most compliance programs (PCI-DSS, HIPAA). They have known cryptographic weaknesses and MITM attacks in the wild. Any Collector receiver or exporter that accepts min_version: "1.0" or "1.1" is a downgrade surface — drop it to 1.2 at minimum, 1.3 when possible.

This rule fires when any receiver protocol TLS block or exporter TLS block has min_version set to "1.0" or "1.1".

Options

FieldConstraint
tls.min_versionMust be "1.2" or "1.3"

Examples

Incorrect
receivers:
otlp:
protocols:
grpc:
endpoint: 0.0.0.0:4317
tls:
min_version: "1.0" # obsolete
cert_file: /etc/certs/server.crt
key_file: /etc/certs/server.key
Correct
receivers:
otlp:
protocols:
grpc:
endpoint: 0.0.0.0:4317
tls:
min_version: "1.3"
cert_file: /etc/certs/server.crt
key_file: /etc/certs/server.key

When Not To Use It

Never. If a legacy client needs TLS 1.0/1.1, put a reverse proxy in front that terminates the old protocol and re-encrypts to the Collector on TLS 1.3.

  • OTEL-032insecure_skip_verify enabled
  • OTEL-033 — receiver on non-localhost endpoint without TLS
  • OTEL-018 — OTLP exporter without TLS on non-local endpoint
  • OTEL-037 — inline key_pem detected

Version

Available since augur v0.1.0.

Further Reading

Resources